IBM, Intel, AMD take different routes to hardware-based encryption

We have encryption for data in motion. We have encryption for data at rest. But one type of data is difficult to keep encrypted — data that is being used. For an application to do something with data, such as checking a document for spelling mistakes, it must be able to see the data.

To read this article in full, please click here

(Insider Story)